Login / Signup
Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models.
Zhenkai Liang
R. Sekar
Published in:
ACSAC (2005)
Keyphrases
</>
buffer overflow
parameter estimation
probabilistic model
feature selection
computer systems
anomaly detection